SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How do you set a DNS server to a cache only DNS server?
Windows XP and Server 2003.
Us edit dnscmd /zoneupdatefromdns command.
Yes
Delete all the zone files or reinstall the DNS service.
2. Where are Applocker policies are configured?
A scheduled task that runs by default collecting information for the Reliability monitor. If disabled it must reenabled manually from the task scheduler mmc snapin.
Anew vpn protocol that uses SSL (port 443) for encryption.
Command to configure the TCP/IP settings.
Through a GPO under Application Control Policies in the Computer Security Settings Node.
3. What are Entertainment Software Rating Board (ESRB) ratings for?
Use SYNC Center
Expose a WIM file contents through Windows Explorer. You can run BCDEDIT.EXE against the mounted image to create or modify the image's boot configuration database.
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
4. What are network monitor aliases used for?
WPA2 and 802.1x but require EAP-TLS to be enable.
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
To display friendly labels to capture packet address headers.
they are enforced and will not allow a user to exceed the space limit.
5. What does Credential Manager allows you to store?
On the properties of the DNS server in the DNS manager.
Credentials - such as user names and passwords that you use to log on to websites or other computers on a network. By storing your credentials - Windows can automatically log you on to websites or other computers. Credentials are saved in special fol
Use the Import Foreign Disk option on the target computer
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
6. How are RRAS/NPS policies evaluated?
It is a advertisement of a service. The record is configured with the service provided - a port number and weight?
Perform an offline migration
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
Windows 7 Professional.
7. How can you delete route table entries?
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
By the RRAS manager or from the command line. For the subnet you can either use the / command or the octet subnet. Example: Route -p add 192.168.1.0/24 192.168.1.1
Use the route delete command.
Turn off the Log Spooler event on a print server.
8. How do you move a Dynamic Disk from one computer to another?
IPV4 and IPV6
Use the Import Foreign Disk option on the target computer
Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
It can add a driver to an offline WIM image with the /Add-Driver option
9. What does Scanstate /EFS:COPYRAW do?
A scheduled task that runs by default collecting information for the Reliability monitor. If disabled it must reenabled manually from the task scheduler mmc snapin.
Migrates EFS encrypted files?
Credentials - such as user names and passwords that you use to log on to websites or other computers on a network. By storing your credentials - Windows can automatically log you on to websites or other computers. Credentials are saved in special fol
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
10. How do you calculate the number of host addresses in a give subnet?
Us edit dnscmd /zoneupdatefromdns command.
Subtract the number of bits in the mask from 32 bits (255.255.255.255). Take the result (x) and have 2 to the power of the result (2^x). Subtract that final result by 2 and that is the amount of host addresses available.
Use it to can backup certificates to a .PFX file that is password protected.
driveletter:\\WindowsImageBackup\
11. Windows 9x ___________ an automatic update client.
SP3
It governs remote access and a user must meet the conditions of at least one of the policies.
Does not have
Use the net sh command to configure the proper ports for remote management.
12. What will happen if click on a hyperlink when you are viewing a web page offline in Internet Explorer?
By the RRAS manager or from the command line. For the subnet you can either use the / command or the octet subnet. Example: Route -p add 192.168.1.0/24 192.168.1.1
From the Network Policy Access Services role in system manager.
Create persistent connections to computers with POWERSHELL
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
13. Why would you use audit-only mode?
To deploy the policy and understand its impact before enforcing it.
They are AAAA records.
Attach to the VHD file created by Windows Backup. You can attach to a VHD file using Disk Management or DISKPART
WPA-Personal (uses a preshared key)
14. How do you determine if your PC's ip and its default gateway are on the same network?
A .WFW file
It is a network health policy defines the minumum level of client health required to connect to the network.
Take the ip address and use the AND command on the calculator to AND the ip address and the subnet. NOTE: AND each octet separately. Then AND the gateway and the subnet. If the AND results are the same you are on the same subnet.
Print services for unix can be configured to share out with the LPD (Line Printer Daemon) and clients send print jobs to LPD using LPR (Line printer remote) client software.
15. ________________ can be replicated through Ad replication.
Conditional forward
Perform an offline migration
Windows 7 Enterprise and Ultimate Editions
The domain profile not the public or private.
16. How do client computers get configured to use a WSUS server?
Scan through the %WinDir%WindowsUpdate.log (ie. C:WindowsWindowsUpdate.log) file.
Configure a GPO to modify the computers location to look for updates.
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
17. What is a DNS SRV record?
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
It is a advertisement of a service. The record is configured with the service provided - a port number and weight?
Export and import it from another computer.
Through a GPO under Application Control Policies in the Computer Security Settings Node.
18. What does sysprep /generalize /oobe /shutdown /unattend:sysprep.xml?
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
an email address where the @ is replaced with a period.
The system will shut down. The next time you start this system (after cloning it) - it will install with the settings in the XML file. The Computer Name will be automatically generated.
On the zone file of the DNS server in the DNS manager.
19. What does servermanagercmd.exe do?
Use the Cipher.exe command line tool.
They relay the status on polices to the Security center for NAP to validate the system to use the network.
Use the "Connect to a Workplace" option
Command line equilivant of Server Manager. You can install/remove roles and features on server 2008?
20. What is WinRS?
A network policy server. It is microsofts implementation of RADIUS server and replaces the IAS (internet authentication service) from windows 2003.
It is a command-line tool which relies on Windows Remote Management (WinRM) to execute remote commands. The basic syntax for WinRS commands is as follows: winrs -r:target command - where target is the name (NetBIOS or FQDN) of the remote computer tha
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
Computer certificates be installed on client computers
21. What is the Powercfg.exe tool?
On the zone file of the DNS server in the DNS manager.
Used to control power settings and configure computers to default to Hibernate or Standby modes. For example - running Powercfg.exe -energy will analyze the computer for energy efficiency.
A suite of tools that allow administrators to understand - control - and manage the quantity and types of data stored on the servers.
Enforce IPSEC on the network
22. What is the cache.DNS file?
DHCPv6 obtains additional configuration settigns.
A file that is loaded when a DNS server starts up and populate the root hints.
Configure aging and scavenging.
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
23. What is WPA-PSK?
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
WPA-Personal (uses a preshared key)
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
It is the max size is expressed in megabytes.
24. What is Optimize for Consistency polling mode do?
WIndows Update Server
They are in the first 48 bits /48
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
Windows XP and Server 2003.
25. Can Offline migration be performed on Windows 2000?
No
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.
26. How do you secure a WSUS connection to a remote SQL server?
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
IPSEC
The DHCP server will ping an ip address before assigning it.
27. What does Windows XP Mode requires?
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
Assign a ipsec policy to all computers - verify the computers can manually authenticate. Assign a client respond only IPSEC policy to the computers. Also either the request server or the security server need IPSEC polices assigned.
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
Which processes currently consume a resource like processor utilization.
28. What is a WSUS server?
WIndows Update Server
To display friendly labels to capture packet address headers.
They must be configured with the ip addresses of the radius server.
Verify that they are not within the scope of the dynamically assigned DHCP addresses.
29. What is the command to set a forwarding computer for event log forwarding?
It can can forward requests from DHCP clients for ip addresses to a remote DHCP server.
WINRM QUICKCONFIG.
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
On the properties of the DNS server in the DNS manager.
30. What is BCDEdit?
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
Expose a WIM file contents through Windows Explorer. You can run BCDEDIT.EXE against the mounted image to create or modify the image's boot configuration database.
31. What protocol does NAP enforce when used in 802.1x authentication?
Use the DHCPv6 to obtain both IPV6 addresses and additional configuration settings.
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
DHCPv6 obtains additional configuration settigns.
EAP protocol.
32. What windows 7 OSs can join a domain?
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
It can be configured to to state the minimum level of system health. Example: To require or not require anitvirus - antipiracy - or firewall to connect to the network.
33. What is a ns record?
Se a capture filter based on the mac address of the problem PC.
Windows 7 Ultimate.
To will ensure the clients download the appropriate printer driver.
It designates an authoritative DNS server - not the soa record.
34. What does the MigApp.xml file do?
Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
SP3
A WDDM driver for the graphics card and a Windows Experience index of 3.0 or greater.
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
35. Where is Software RAID is configured?
Windows 7 Professional.
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
At the volume level - not the drive level.
They are monitored but not enforced. Users can exced there quota limit.
36. What does NETSH BRANCHCACHE FLUSH do?
Use IPCONFIG or Status Details for the Network Connection.
It is the max size is expressed in megabytes.
Clear the content being cached
Vista SP1 and Server 2008 and above.
37. What is the responsible person on a SOA records field?
Send email notifications
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
They are in the first 48 bits /48
an email address where the @ is replaced with a period.
38. What do NAP clients do?
Prevents the server from performing Internet name resolution.
Default Programs Control Panel applet
They relay the status on polices to the Security center for NAP to validate the system to use the network.
The domain profile not the public or private.
39. What controlls file extensions?
The Default Programs Control Panel applet
Clients establish an IPsec tunnel for the IPv6 traffic to the DirectAccess server - which acts as a gateway to the intranet. The DirectAccess client establishes two IPsec tunnels: Psec Encapsulating Security Payload (ESP) tunnel and IPsec ESP tunnel.
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
40. What must you do if DHCP is not installed on the same computer as the RADIUS server?
Used to get a list of installed 3rd party drivers
Client needs Remote Desktop Connection 6.0 or above - Client must use an os that supports CredSSP (Credential Security Support Providoer) - The terminal server must user windoes 2008 and above.
Enforce IPSEC on the network
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
41. What do DFS nameservers need to do to obtain the most current namespace data?
Take the ip address and use the AND command on the calculator to AND the ip address and the subnet. NOTE: AND each octet separately. Then AND the gateway and the subnet. If the AND results are the same you are on the same subnet.
It can be configured to to state the minimum level of system health. Example: To require or not require anitvirus - antipiracy - or firewall to connect to the network.
Pool Active Directory.
Use dnscmd /recorddelete
42. What needs to be enabled for smart card logon?
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
Expose a WIM file contents through Windows Explorer. You can run BCDEDIT.EXE against the mounted image to create or modify the image's boot configuration database.
The domain profile not the public or private.
Modify/Create a GPO
43. How can you can prevent users from accessing certain MMC console snap ins?
By using the dnscmd /zoneexport command.
Backups of the full system including all critical volumes (volumes that contain operating system state).
Through a GPO.
Configure a GPO to modify the computers location to look for updates.
44. What does importing and exporting rules affect?
You add it back to a DNS zone - clear the server DNS cache and clients DNS cache.
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
Set IE back to its default settings
From the Network Policy Access Services role in system manager.
45. What does the MigDocs.xml file do?
WECUTIL QC
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
46. What does DISM do?
Who can shutdown a computer
It can add a driver to an offline WIM image with the /Add-Driver option
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
47. What is Aero Peek?
Attach to the VHD file created by Windows Backup. You can attach to a VHD file using Disk Management or DISKPART
Hovering over a taskbar icon shows thumbnail of that program. Hovering over the thumbnail shows a preview of that program in full view. Aero Peek also refers to the "Show desktop" button to the far right of the new taskbar.
Deploy a secondary zone.
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
48. Are Migrated user accounts are enabled by default?
Forward to another DNS server
A .WFW file
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
No they are disabled
49. What does DISM /UNMOUNT-WIM /COMMIT do?
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
Through a GPO under Application Control Policies in the Computer Security Settings Node.
4 (bits 53 - 56) /56 Allows for 16 regions
Windows Aero was revised to be more touch-friendly.
50. How do you restore a System Image from backup?
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
Can be configured through a GPO
Does not
Create a Custom Rule. By default Predefined Firewall Rules apply to all computers sending network traffic.